Location-Aware Malware Targets Japanese and Korean Endpoints

2019-06-10T18:55:10-07:00March 14th, 2019|Threats|

New malware samples use location awareness to specifically target Japanese and Korean endpoints. The malware uses two techniques to determine the location in which it is being executed and ensures that the payload will only be triggered in these regions. This approach matches two trends: 1) docs performing regional checks in targeted attacks, and 2) [...]

Lack of Collaboration Could be Putting Global Response to Cybercrime at Risk

2019-01-04T07:04:41-07:00January 4th, 2019|Web of Profit|

Without an agile, holistic approach to cybercrime prevention, hackers will continue to run rampant in the digital ecosystem A coordinated global response is vital to the reduction and prevention of cybercrime There’s been a lot of geopolitical tension in the air in 2018, which could escalate further in the next 12 months. With the outcome [...]

Catch Me If You Can: The Changing Faces of Malware

2018-12-21T14:29:25-07:00November 14th, 2018|Web of Profit|

The reappearance of malware variants shows how platform criminality is enabling hackers to teach old code new tricks The security industry and authorities need to work together to understand how platforms are being used to resurrect malware New malware is constantly emerging into the ever-growing threat landscape, and the diversity and number of attacks that [...]

How Hackers Exploit Online Games

2018-12-21T14:29:47-07:00October 31st, 2018|Web of Profit|

Legitimate platforms like online gaming services are a breeding ground for hackers, with in-game currencies and micro-transactions putting a target on the gaming industry’s back Online games have also provided a testing ground for hackers keen to test their malware on unsuspecting players Hackers taking advantage of social networks like LinkedIn is nothing new in [...]

Bromium Announces Capture the Flag BYOM Challenge

2018-10-29T17:37:36-07:00October 29th, 2018|BYOM|

Bromium is announcing a Capture the Flag Bring Your Own Malware (BYOM) competition To win a $30,000 cash prize, you have to submit a sample of malware that successfully breaks out from our hardware-enforced containment and gains access to the flag file For details, rules, and submission instructions, visit www.bromium.com/byom This week, Bromium announced a [...]

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

2018-07-20T17:47:52-07:00July 19th, 2018|Threats|

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing proliferation of “fileless malware” — malware that uses trusted programs in sinister ways, instead of delivering the usual malicious payloads — and find [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16-07:00February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

Bromium Honored for Excellence in Government Cybersecurity

2018-01-09T14:21:37-07:00January 9th, 2018|Company News, Government|

We have a successful track record protecting federal government customers from known and unknown attacks Leading government security awards program recognizes Bromium’s continued commitment to the public sector Bromium provides defense-grade protection, allowing government employees to work as usual On January 8th, we received exciting news that we won two Government Security News Homeland Security [...]

Easily Isolate Downloads and Executables So Threats Can’t Escape [video]

2018-01-03T13:38:40-07:00January 3rd, 2018|Threats|

Safely download any file from the web or a shared link, even if it is malicious Eliminate restrictive IT security policies that limit user access to downloaded files and inhibit workflows Automatically verify the integrity of downloaded files without involving the Helpdesk Most knowledge-workers are on the internet all day long, mixing business and personal [...]

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close